Q1: Who invented Compact Disc?
Explanation: A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.
Q4: In MS-Word, what is the maximum font size you can apply for any character?
B. HTTP only Cookie
C. Zombie Cookie
D. Session Cookie
E. None of these
Ans: James T Russel
Q2 .'Weaving The Web' was written by.....?
Ans2. Tim Berners-Lee
Q3. Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A) Viruses
B) Trojan horses
C) Bots
D) Worms
E) Backdoors
B) Trojan horses
C) Bots
D) Worms
E) Backdoors
Ans3. Worms
Explanation: A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.
Q4: In MS-Word, what is the maximum font size you can apply for any character?
Ans: 1638
Q5: Which of the following is a cookie that is automatically recreated after being deleted?
A. Super CookieB. HTTP only Cookie
C. Zombie Cookie
D. Session Cookie
E. None of these
Ans: Zombie Cookie
Q6: The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
A) Phishing
B) Eavesdropping
C) Scams
D) Exploits
E) Denial of service
B) Eavesdropping
C) Scams
D) Exploits
E) Denial of service
Ans: Eavesdropping
Explanation:
Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information.This type of network attack is generally one of the most effective as a lack of encryption services are used. It is also linked to the collection of metadata.
Q7: _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Ans: Keylogging
Q8: The database administrator’s function in an organization is _____.
A) to be responsible for the more technical aspects of managing the information contained in organizational databases
B) to be responsible for the executive level aspect of decisions regarding the information management
C) to show the relationship among entity classes in a data warehouse
D) to define which data mining tools must be used to extract data
E) None of these
Q8: The database administrator’s function in an organization is _____.
A) to be responsible for the more technical aspects of managing the information contained in organizational databases
B) to be responsible for the executive level aspect of decisions regarding the information management
C) to show the relationship among entity classes in a data warehouse
D) to define which data mining tools must be used to extract data
E) None of these
Ans: Option A(to be responsible for the more technical aspects of managing the information contained in organizational databases)
Explanation: A database administrator is a person responsible for the design, implementation, maintenance and repair of an organization’s database.
Q9: One-way authentication is based on____.
A) Possession of a secret (Password)
B) Possession of an artifact
C) Unique physiological or behavioral characteristics of the user
D) All of the above
E) none of these
Q9: One-way authentication is based on____.
A) Possession of a secret (Password)
B) Possession of an artifact
C) Unique physiological or behavioral characteristics of the user
D) All of the above
E) none of these
Ans: Option A(Possession of a secret (Password))
Explanation: One way or single factor authentication is the traditional security process that requires one of the following elements before granting access to the users. There are “something user have “(including keys or token cards) Something user know (including passwords) or something user are (including fingerprints, voiceprints or retinal scan like iris.
Q10: Which of the following device used ‘set of beads’ to represent the unit of data?
(a) ENIAC
(b) EDVAC
(c) Abacus
(d) MARK-I
(e) None of these
Ans: (c) Abacus
Q10: Which of the following device used ‘set of beads’ to represent the unit of data?
(a) ENIAC
(b) EDVAC
(c) Abacus
(d) MARK-I
(e) None of these
Ans: (c) Abacus
No comments:
Post a Comment